Impacts and risk assessment of technology for Internet security : enabled information small-medium enterprises (TEISMES) /
Saved in:
Author / Creator: | Shoniregun, Charles A. |
---|---|
Imprint: | New York : Springer, 2005. |
Description: | 1 online resource (x, 196 p.) : ill. |
Language: | English |
Series: | Advances in information security ; 17 Advances in information security ; 17. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/8874518 |
Table of Contents:
- Dedications
- List of Figures
- List of Tables
- List of Contributors and Organisations
- Preface
- Acknowledgements
- 1. Research Overview and Technologies for Internet security
- 1. Introduction
- 2. Research Rationale
- 3. Research Hypothesis
- 4. Conceptual Research Context
- 5. TEISMEs Business Operational Risks
- 6. Technology for Internet Security
- 7. Summary of Chapter One
- References
- 2. Impacts of TEI on SMEs
- 1. Introduction
- 2. Impacts of TEI on SMEs in the UK
- 3. Disintermediation and Reintermediation
- 4. Promote Products to Suit Each Individual Customer
- 5. Electronic Payment
- 6. Generic Problems with Network Protocol Layers
- 7. Application Security Problems
- 8. Summary of Chapter Two
- References
- 3. Risk Assessment of TEI on TEISME
- 1. Introduction
- 2. Concept of Risk
- 3. Risk and the Risk Assessment Approaches
- 4. Quantitative Approaches
- 5. Qualitative Risk Assessment Model
- 6. Weaknesses Of Risk Assessment Models
- 7. Why BS7799
- 8. Summary of Chapter Three
- References
- 4. Methodology
- 1. Introduction
- 2. Method
- 3. Shoniregun Risk Assessment Model
- 4. Analysis of Shoniregun's Risk Assessment Model Implementation
- 5. of Chapter Four
- References
- 5. Analysis of Results
- 1. Introduction
- 2. Analysis of 500 Teismes Based on co.uk Service Provider
- 3. Laboratory Experiments
- 4. Analysis of400 Teismes Questionnaire Survey
- 5. Correlation Between Annual Sales and Vulnerability
- 6. Analysis of Teismes Interviewed
- 7. Analysis of Case Study Observations
- 8. Shoniregun Teisme Risk Assessrnent Calculation
- 9. Result Summary of Hypotheses Test
- 10. Summary of Chapter Five
- References
- 6. Critical Evaluation and Discussion
- 1. Introduction
- 2. Challenges of TEI on Information Security
- 3. Shared Threats
- 4. Teismes Business Operations are not Immune to Internet Attacks
- 5. Risks and Trust
- 6. Teisme Business Operational Risk Liability
- 7. Current Developments in Internet Security
- 8. Government Concern Over Security
- 9. of Chapter Six
- References
- 7. Conclusion
- 1. Global Issues and Internet Security Facing TEISMEs
- 2. Recommendations
- 3. FutureWork
- References
- Index